This repository contains the source code for the paper:
Ruoyan Lin, Shishuai Yang (✉️), Fenghao Xu, and Wenrui Diao (✉️). Dialing Danger: Large-Scale Mining and Risk Assessment of Android Secret Codes in OEM Firmware. The 33rd IEEE International Conference on Software Analysis, Evolution, and Reengineering, Limassol, Cyprus. March 17-20, 2026.
- Python Version: 3.10.6
pip install -r requirements.txt
- Place the test APKs in the
./TestApkdirectory following the folder structure of brand - firmware - APKs. - Decompile APKs. If jadx is not used, specify the file path using
setAPK. - Set the vendor-defined secret code actions in
./PreProcess/custom_action.txt. - The files are output to the
./TestDatadirectory.
python ./PreProcess/pre_process.py
- The files are output to the
./Examinationdirectory.
python ./main.py
- The files are output to the
./ReasonableResultsdirectory.
python ./reasonableCheck.py